×

System and method of authenticating individuals

  • US 6,904,526 B1
  • Filed: 11/14/2000
  • Issued: 06/07/2005
  • Est. Priority Date: 04/28/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of authenticating an individual from at least one individual in an authentication system, including at least one dynamic password generator and at least one verifier, said dynamic password generator holding therein a first secret cryptographic key and a first dynamic variable, said verifier holding therein a second secret cryptographic key of said dynamic password generator and a second dynamic variable, said first and second dynamic variables being produced independently in said dynamic password generator and said verifier;

  • said method comprising steps of;

    (a) in the event of generating a dynamic password, performing following steps by a microprocessor in said dynamic password generator;

    (a1) segmenting said first dynamic variable, based on a predefined segment length and positions, identifying a first segment initial value and a first offset for said first dynamic variable;

    (a2) carrying out a first encryption process on said first secret cryptographic key, said first segment initial value and said first offset to produce a first dynamic cipher;

    carrying out a second encryption process on said first secret cryptographic key and said first dynamic variable to produce a second dynamic cipher;

    (a3) combining said first dynamic cipher and said second dynamic cipher to produce a dynamic password;

    (b) transmitting said dynamic password to said verifier;

    (c) in the event of verifying a password, performing following steps by a microprocessor in said verifier;

    (c1) separating a received dynamic password into a third dynamic cipher and a fourth dynamic cipher;

    based on a predefined segment length and positions, segmenting said second dynamic, variable to identify a second segment initial value and a second offset for said second dynamic variable; and

    calculating at least one estimated segment initial value and an estimated range of offsets based on said second segment initial value and said second offset;

    (c2) carrying out a third encryption process on said third dynamic cipher, an estimated segment initial value and said second secret cryptographic key to produce a third offset;

    (c3) if said third offset is within the estimated range of offsets, restituting a third dynamic variable with said third offset and said estimated segment initial value;

    carrying out a fourth encryption process on said second secret cryptographic key and said third dynamic variable to produce a verification code;

    comparing said verification code with said fourth dynamic cipher;

    if matching, enabling the user to access since the user is deemed legal and having the verification terminated;

    if mismatching, or said third offset is not within the estimated range of offsets, judging whether there is another estimated segment initial value;

    if there is no other estimated segment initial value, rejecting the user'"'"'s access and having the verification terminated since the user is deemed illegal; and

    if there is another estimated segment initial value, fetching a next estimated segment initial value and going to step (c2).

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×